Cybercriminals are known to take advantage of sporting events like the London Olympics 2012 for their malicious activities. Some of the attacks that leveraged this event include fake live streaming websites, fraudulent sites that sell bogus tickets, and malicious Olympics-related app hosted in a fake Google Play store. Adding to the list of attacks using…

Security Predictions for 2018

Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.Read our security predictions for 2018.

Business Process Compromise

Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more,
read our Security 101: Business Process Compromise.